Software protection method

A technology of software protection and software, applied in the direction of program/content distribution protection, digital data processing components, instruments, etc., can solve the problems that the encryption lock cannot further improve the protection of software, and cannot guarantee the security of software codes, etc., to achieve improvement The effect of speed, ensuring safety, and increasing protection

Inactive Publication Date: 2007-09-19
BEIJING SENSESHIELD TECH
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the disadvantage of the prior art is that the adoption of the virtual machine mechanism limits the speed at which the dongle processes software codes, and limits the amount of software codes that can be transplanted into the dongle, resulting in the inability of the dongle to further protect the software. improve; and if the virtual machine mechanism is not used, the security of the software code transplanted into the dongle cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method
  • Software protection method
  • Software protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The core idea of ​​the present invention is: the code running inside the dongle is divided into two parts, the system level and the user level, and the code responsible for the initialization of the dongle and the scheduling of internal resources of the dongle runs at the system level; To protect software code running at user level. Both system-level code and user-level code run directly on the dongle's processor.

[0045] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0046] Please refer to Fig. 1, Fig. 1 is the flow chart of downloading code in the software protection method provided by the present invention, and this method comprises when downloading code:

[0047] Step 101: Divide the code storage of the dongle into a system storage area and a user storage area.

[0048] The sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software protection method, in which partial code of the protected software are compiled to a format that can be recognized by an encryption lock and transplanted thereto, the method for operating the protected software on a target platform comprising: A. Triggering the encryption and executing the transplanted code when the transplanted code is to be executed; B. The encryption lock processor executing the transplanted code and returning the executed result to the target platform. By using the technical scheme, the transplanted code is stored in a format that can be recognized by the encryption lock processor to the storage area of the encryption lock and operated on the processor directly, accordingly the velocity executed of the software code by the encryption lock is enhanced, therefore the software codes can be transplanted into the encryption lock, thereby the protection of the software by using the encryption is improved.

Description

technical field [0001] The invention relates to software protection technology, in particular to a method for protecting software by using a software encryption lock. Background technique [0002] In the software protection technology combined with hardware, in order to improve the strength of software protection, the key code of the software to be protected can be transplanted into a dongle independent of the software target platform. The so-called dongle is a hardware system with a certain processing capability, which can be connected with the software target platform through an interface. When the software is running on the target platform, when it is necessary to execute key codes, the target platform sends call parameters to the dongle, and the dongle executes key codes inside the dongle according to the call parameters for processing, and then returns the processing results to the target platform . In this way, the correct dongle hardware must be owned at the same ti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F1/00G06F21/12
Inventor 念龙龙孙吉平殷广英黄剑
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products